ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA24136] Microsoft Windows HTML Help ActiveX Control Vulnerability



> 
> ----------------------------------------------------------------------
> 
> TITLE:
> Microsoft Windows HTML Help ActiveX Control Vulnerability
> 
> SECUNIA ADVISORY ID:
> SA24136
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/24136/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> System access
> 
> WHERE:
> From remote
> 
> OPERATING SYSTEM:
> Microsoft Windows 2000 Advanced Server
> http://secunia.com/product/21/
> Microsoft Windows 2000 Datacenter Server
> http://secunia.com/product/1177/
> Microsoft Windows 2000 Professional
> http://secunia.com/product/1/
> Microsoft Windows 2000 Server
> http://secunia.com/product/20/
> Microsoft Windows Server 2003 Datacenter Edition
> http://secunia.com/product/1175/
> Microsoft Windows Server 2003 Enterprise Edition
> http://secunia.com/product/1174/
> Microsoft Windows Server 2003 Standard Edition
> http://secunia.com/product/1173/
> Microsoft Windows Server 2003 Web Edition
> http://secunia.com/product/1176/
> Microsoft Windows XP Home Edition
> http://secunia.com/product/16/
> Microsoft Windows XP Professional
> http://secunia.com/product/22/
> 
> DESCRIPTION:
> A vulnerability has been reported in Microsoft Windows, which can be
> exploited by malicious people to compromise a user's system.
> 
> The vulnerability is caused due to certain parameters not being
> properly initialised by the HTML ActiveX control (Hhctrl.ocx) when
> handling certain methods.
> 
> Successful exploitation allows execution of arbitrary code when a
> user e.g. visits a malicious website.
> 
> NOTE: Other unspecified issues discovered internally by Microsoft
> have also been reported.
> 
> SOLUTION:
> Apply patches.
> 
> Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=211a9
> c07-88ff-4ae4-a82a-ce2045c6c4fe
> 
> Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=a3700
> 273-d7da-4a60-ba80-c95c8036d670
> 
> Windows XP Professional x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=69ef4
> daa-cf0f-4898-8675-911428e7fd74
> 
> Windows Server 2003 (optionally with SP1):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=5a1f1
> 607-b6ec-41e2-aac0-34387f1211a7
> 
> Windows Server 2003 for Itanium-based systems (optionally with SP1):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=d638c
> 8e8-5fbe-4a32-945c-440a4b684b0f
> 
> Windows Server 2003 x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=65bf2
> 245-6c89-43db-8d28-12988791c395
> 
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits HD Moore, BreakingPoint Systems.
> 
> ORIGINAL ADVISORY:
> MS07-008 (KB928843):
> http://www.microsoft.com/technet/security/Bulletin/MS07-008.mspx
> 



 




Copyright © Lexa Software, 1996-2009.